641 | -- | 644 | Jinguang Han, Yogachandran Rahulamathavan, Willy Susilo. Preface |
645 | -- | 660 | Chunguang Ma, Juyan Li, Weiping Ouyang. Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment |
661 | -- | 682 | Rashed Mazumder, Atsuko Miyaji, Chunhua Su. Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data |
683 | -- | 704 | Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu. Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud |
705 | -- | 724 | Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Guang Zeng, Wenbao Han. Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud |
725 | -- | 742 | Yangguang Tian, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, Yong Yu. One-Round Attribute-Based Key Exchange in the Multi-Party Setting |
743 | -- | 760 | Fucai Zhou, Su Peng, Jian Xu 0004, Zifeng Xu. Identity-Based Batch Provable Data Possession with Detailed Analyses |
761 | -- | 780 | Jianye Huang, Qiong Huang, Chunhua Pan. A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting |
781 | -- | 798 | Chin-Ling Chen, Jungpil Shin, Yu-Ting Tsai, Aniello Castiglione, Francesco Palmieri. Securing Information Exchange in VANETs by Using Pairing-Based Cryptography |
799 | -- | 818 | Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Qianhong Wu. Confidentiality-Preserving Publicly Verifiable Computation |